透過您的圖書館登入
IP:18.206.13.203

Parallel abstracts


There are several tools that use techniques like static analysis, lexical analysis etc to detect the vulnerabilities in Java based programs. However still there are vulnerabilities which are not traceable by the available tools. The objective of this paper is twofold. We develop a method to detect vulnerabilities in Java programs. Further we analyze the dependencies among the vulnerabilities using mathematical lattice theory based formal concept analysis. Our experimental result show that the proposed model is able to detect the untraceable vulnerabilities and the dependency analysis is in good agreement with the literature.

References


Aswani Kumar, Ch.(2011).Knowledge discovery in data using formal concept analysis and random projections.International Journal of Applied Mathematics and Computer Science.21(4),745-756.
Aswani Kumar, Ch.(2011).Mining association rules using non-negative matrix factorization and formal concept analysis.Communications in Computer and Information Science.157,31-39.
Aswani Kumar, Ch.(2012).Modeling access permissions in role based access control using formal concept analysis.Wireless Networks and Computational Intelligence.(Wireless Networks and Computational Intelligence).:
Aswani Kumar, Ch.(2012).Fuzzy clustering based formal concept analysis for association rules mining.Applied Artificial Intelligence.26(3),274-301.
Aswani Kumar, Ch.(2013).Designing role based access control using formal concept analysis.Security and Communication Networks.6(3),373-383.

Cited by


Shih, J. F. (2011). 一套整合的網路應用安全分析與驗證工具 [master's thesis, National Taiwan University]. airiti Library. https://doi.org/10.6342/NTU.2011.01077

Read-around